Which of the following is an example of privilege escalation?

A. A hacker accesses a printer from the Internet, then the print server, and then the domain controller
B. A hacker sends many oversized ping packets.
C. A hacker convinces a user to reveal a password.
D. A hacker follows a user into the facility.

A
Explanation: When systems are accessed by unauthorized personal a privilege escalation has occurred.

Computer Science & Information Technology

You might also like to view...

This command displays a folder in an existing folder window

A) Explore B) Restore C) Move D) Open

Computer Science & Information Technology

?Windows users who want to allow multiple people use of their computer can add a(n) ____ for each user.

A. ?index B. ?account C. ?digest D. ?customization

Computer Science & Information Technology